Snooping Sadia Talks to Former Official Gene Fishel — Unauthorized Access Podcast
Uncovering Hidden Risks - Episode 7 - Cloud Native Data Loss Prevention: The Future of Data Security
No Password Required: A Cyber Practice Leader and Natural Optimist Who Believes Every Day Is the Best Day
Sitting with the C-Suite: Learning How to Aggregate Evidence Outside of the Legal Industry
CF on Cyber: Leveraging the Incident Response Guide to Prepare for the CCPA
Information leaks can range from internal decisions and salary data to intellectual property, strategy documents, or board minutes. Whether caused by accident or intent, all leaks demand immediate, structured action. Even...more
While business risks abound, including intensified cybersecurity attacks, the impact of rapid technological advances and increasing regulations, there are healthy ways to uncover and mitigate risks. Organizations are...more
At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more
We all know that businesses rely on a large number of third-party vendors to support their business operations. Many of these third parties require access to a company’s data and its internal information and technology...more
In 2015, identity theft occurred every two seconds, disrupting the lives of 13.1 million people, according to Javelin Strategy and Research. Year after year, U.S. data breaches have hit record highs, reports the Identity...more